Presentation is loading. Please wait.

Presentation is loading. Please wait.

Instructor: Dr. Phillip Jones

Similar presentations


Presentation on theme: "Instructor: Dr. Phillip Jones"— Presentation transcript:

1 Instructor: Dr. Phillip Jones
CPRE 583 Reconfigurable Computing Lecture 10: Fri 9/23/2011 (Reconfiguration Management) Instructor: Dr. Phillip Jones Reconfigurable Computing Laboratory Iowa State University Ames, Iowa, USA

2 Announcements/Reminders
MP1: Due today, and MP2 will be released tonight. Mini literary survey assigned PowerPoint tree due: Fri 9/23 by class (today), so try to have to me by 9/22 night. Final 5-10 page write up on your tree due: Fri 9/30 midnight.

3 Literary Survey Start with searching for papers from on IEEE Xplorer: Advanced Search (Full Text & Meta data) Find popular cross references for each area For each area try to identify 1 good survey papers For each area Identify 2-3 core Problems/issues For each problem identify 2-3 Approaches for addressing For each approach identify 1-2 papers that Implement the approach.

4 Literary Survey: Example Structure
Network Intrusion Detection P1 P2 P3 A1 A2 A3 A1 A2 A1 A2 I1 I1 I2 I1 I1 I1 I1 I2 I1 5-10 page write up on your survey tree

5 Fall 2010 Student Example Network Intrusion Detection Systems
detection accuracy signatures The Study on Network Intrusion Detection System of Snort heuristics An FPGA-Based Network Intrusion Detection Architecture adaptability to new threats neural networks Network Intrusion Detection Method Based on Radial Basic Function Neural Network principal component analysis An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System support vector machine Network Intrusion Detection Based on Support Vector Machine Network Intrusion Detection Method Based on Agent and SVM

6 Initial Project Proposal Slides (5-10 slides)
Project team list: Name, Responsibility (who is project leader) Team size: 3-4 (5 case-by-case) Project idea Motivation (why is this interesting, useful) What will be the end result High-level picture of final product High-level Plan Break project into mile stones Provide initial schedule: I would initially schedule aggressively to have project complete by Thanksgiving. Issues will pop up to cause the schedule to slip. System block diagrams High-level algorithms (if any) Concerns Implementation Conceptual Research papers related to you project idea

7 Projects Ideas: Relevant conferences
FPL FPT FCCM FPGA DAC ICCAD Reconfig RTSS RTAS ISCA Micro Super Computing HPCA IPDPS

8 Weekly Project Updates
The current state of your project write up Even in the early stages of the project you should be able to write a rough draft of the Introduction and Motivation section The current state of your Final Presentation Your Initial Project proposal presentation (Due Fri 10/22). Should make for a starting point for you Final presentation What things are work & not working What roadblocks are you running into

9 Projects: Target Timeline
Teams Formed and Topic: Mon 10/10 Project idea in Power Point 3-5 slides Motivation (why is this interesting, useful) What will be the end result High-level picture of final product Project team list: Name, Responsibility High-level Plan/Proposal: Fri 10/14 Power Point 5-10 slides System block diagrams High-level algorithms (if any) Concerns Implementation Conceptual Related research papers (if any)

10 Projects: Target Timeline
Work on projects: 10/ /9 Weekly update reports More information on updates will be given Presentations: Finals week Present / Demo what is done at this point 15-20 minutes (depends on number of projects) Final write up and Software/Hardware turned in: Day of final (TBD)

11 Project Grading Breakdown
50% Final Project Demo 30% Final Project Report 20% of your project report grade will come from your 5-6 project updates. Friday’s midnight 20% Final Project Presentation

12 Common Questions

13 Common Questions

14 Overview Chapter 4: Reconfiguration Management

15 What you should learn Some basic configuration architectures
Key issues when managing the reconfiguration of a system

16 Reconfiguration Management
Goal: Minimize the overhead associated with run-time reconfiguration Why import to address Can take 100’s of milliseconds to reconfigure a device For high performance applications this can be a large overhead (i.e. decreases performance)

17 High Level Configuration Setups
Externally trigger reconfiguration CPU Configuration Request FPGA ROM (bitfile) Config Data FSM Config Control (CC)

18 High Level Configuration Setups
Self trigger reconfiguration FPGA Config Data ROM (bitfile) FSM CC

19 Configuration Architectures
Single-context Multi-context Partially Reconfigurable Relocation & Defragmentation Pipeline Reconfiguration Block Reconfigurable

20 Single-context FPGA Config clk Config I/F Config Data Config enable
OUT IN OUT IN OUT EN EN EN Config enable

21 Multi-context FPGA 1 1 2 2 3 3 Config clk Context switch Config Config
OUT IN OUT IN EN EN Context switch 1 1 Context 1 Enable 2 2 Context 2 Enable 3 3 Context 3 Enable Config Enable Config Enable Config Data Config Data

22 Partially Reconfigurable
Reduce amount of configuration to send to device. Thus decreasing reconfiguration overhead Need addressable configuration memory, as opposed to single context daisy chain shifting Example Encryption Change key And logic dependent on key PR devices AT40K Xilinx Virtex series (and Spartan, but not a run time) Need to make sure partial config do not overlap in space/time (typical a config needs to be placed in a specific location, not as homogenous as you would think in terms of resources, and timing delays)

23 Partially Reconfigurable

24 Partially Reconfigurable
Full Reconfig 10-100’s ms

25 Partially Reconfigurable
Partial Reconfig 100’s us - 1’s ms

26 Partially Reconfigurable
Partial Reconfig 100’s us - 1’s ms

27 Partially Reconfigurable
Partial Reconfig 100’s us - 1’s ms

28 Partially Reconfigurable
Partial Reconfig 100’s us - 1’s ms

29 Partially Reconfigurable
Partial Reconfig 100’s us - 1’s ms Typically a partial configuration modules map to a specific physical location

30 Relocation and Defragmentation
Make configuration architectures support relocatable modules Example of defragmentation text good example (defrag or swap out, 90% decrease in reconfig time compared to full single context) Best fit, first fit, … Limiting factor Routing/logic is heterogeneous timing issues, need modified routes Special resources needed (e.g. hard mult, BRAMS) Easy issue if there are blocks of homogeneity Connection to external I/O (fix IP cores, board restrict) Virtualized I/O (fixed pin with multiple internal I/Fs? 2D architecture more difficult to deal with Summary of feature PR arch should have Homogenous logic and routing layout Bus based communication (e.g. network on chip) 1D organization for relocation

31 Relocation and Defragmentation
B C

32 Relocation and Defragmentation

33 Relocation and Defragmentation

34 Relocation and Defragmentation

35 Relocation and Defragmentation

36 Relocation and Defragmentation
More efficient use of Configuration Space C A

37 Pipeline Reconfigurable
Example: PipeRench Simplifies reconfiguration Limit what can be implemented Cycle Virtual Pipeline stage 1 2 3 4 PE PE PE PE 1 1 1 PE PE PE PE 2 2 2 3 3 3 PE PE PE PE 4 4 Cycle Physical Pipeline stage 1 2 3 3 3 1 1 1 4 4 2 2 2

38 Block Reconfigurable Swappable Logic Units
Abstraction layer over a general PR architecture: SCORE Config Data

39 Managing the Reconfiguration Process
Choosing a configuration When to load Where to load Reduce how often one needs to reconfigure, hiding latency

40 Configuration Grouping
What to pack Pack multiple related in time configs into one Simulated annealing, clustering based on app control flow

41 Configuration Caching
When to load LRU, credit based dealing with variable sized configs

42 Configuration Scheduling
Prefetching Control flow graph Static compiler inserted conf instructions Dynamic: probabilistic approaches MM (branch prediction) Constraints Resource Real-time Mitigation System status and prediction What are current request Predict which config combination will give best speed up

43 Software-based Relocation Defragmentation
Placing R/D decision on CPU host not on chip config controller

44 Context Switching Safe state then start where left off.

45 MP2 Overview

46 Network Processing Example: UDP
UDP – User Datagram Protocol Popular protocol for sending data over the internet (TCP is popular another protocol) Typical encapsulated within IP (Internet Protocol) UDP/IP Gives no guarantee of delivery Relies on application layer to implement reliability Unlike TCP which has reliably delivery build in. Reference for more info on IP and UDP details RCFs Course

47 Destination IP Address
UDP/IP Packet Format Ver IHL TOS Total Length Note: flags 3 bits Identification flags fragment offset IP Header UDP Protocol = 17 TTL Protocol Header Checksum Source IP Address Destination IP Address Options Padding Source Port Destination Port UDP Header UDP length (bytes) = UDP header+payload Length Checksum Byte1 Byte2 Byte3 Byte4 Payload 31 32-bits

48 Example: Network Processing Tasks
Raise an alert signal when the pattern “corn!” is detected Return the number of times “corn!” is detected Place count value as the last byte of the payload

49 Streaming Network application (MP1)
Detect patterns in payload (e.g. “Corn!”) Place the number of detections in last byte of payload FSM Send Alert Modify Packet ! n r o C length dest port

50 MP2 Overview

51 Next Lecture Convey: HC1 overview/case study Reading 5 and 6

52 Questions/Comments/Concerns
Write down Main point of lecture One thing that’s still not quite clear If everything is clear, then give an example of how to apply something from lecture OR

53 Lecture Notes


Download ppt "Instructor: Dr. Phillip Jones"

Similar presentations


Ads by Google